Analysis
-
max time kernel
54s -
max time network
60s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-03-2021 19:25
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft_Windows_10_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Microsoft_Windows_10_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Microsoft_Windows_10_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Microsoft_Windows_10_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
Microsoft_Windows_10_keygen_by_KeygenNinja.exe
-
Size
10.6MB
-
MD5
f986b0da579828fa492041a33862a74d
-
SHA1
79ce5993da004a0a96609b9f025befb7bf391009
-
SHA256
df7a1a5d4e81f076198ed56b9bae34bf8f907e300d22cd8681f910472609422e
-
SHA512
6148127921cbe28135e002f6d0f72f717ffcf980cfd8faaea1d73a813123884a996526925cf05fefb288810b8cfd9065ed618ac98ab2b5d63bd637ce55fbf519
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Nirsoft 4 IoCs
resource yara_rule behavioral1/files/0x000600000001ab8b-92.dat Nirsoft behavioral1/files/0x000600000001ab8b-93.dat Nirsoft behavioral1/files/0x000200000001abb0-105.dat Nirsoft behavioral1/files/0x000200000001abb0-104.dat Nirsoft -
Executes dropped EXE 14 IoCs
pid Process 3688 intro.exe 3008 keygen-pr.exe 1420 keygen-step-1.exe 2952 keygen-step-3.exe 3612 keygen-step-4.exe 3576 key.exe 2724 002.exe 2800 key.exe 908 Setup.exe 3108 setup.exe 3656 aliens.exe 3520 jg2_2qua.exe 500 08B935EBAFB9032A.exe 3588 08B935EBAFB9032A.exe -
resource yara_rule behavioral1/files/0x000300000001ab89-68.dat office_xlm_macros -
Loads dropped DLL 4 IoCs
pid Process 908 Setup.exe 908 Setup.exe 908 Setup.exe 3692 MsiExec.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg2_2qua.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 aliens.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3656 aliens.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3576 set thread context of 2800 3576 key.exe 91 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\k42a4i0zb2uk\aliens.exe setup.exe File opened for modification C:\Program Files (x86)\k42a4i0zb2uk\aliens.exe setup.exe File opened for modification C:\Program Files (x86)\k42a4i0zb2uk setup.exe File created C:\Program Files (x86)\k42a4i0zb2uk\__tmp_rar_sfx_access_check_259331875 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x000300000001a0e3-60.dat nsis_installer_1 behavioral1/files/0x000300000001a0e3-60.dat nsis_installer_2 behavioral1/files/0x000300000001a0e3-61.dat nsis_installer_1 behavioral1/files/0x000300000001a0e3-61.dat nsis_installer_2 behavioral1/files/0x00030000000197fe-70.dat nsis_installer_1 behavioral1/files/0x00030000000197fe-70.dat nsis_installer_2 behavioral1/files/0x00030000000197fe-71.dat nsis_installer_1 behavioral1/files/0x00030000000197fe-71.dat nsis_installer_2 behavioral1/files/0x00030000000197fe-74.dat nsis_installer_1 behavioral1/files/0x00030000000197fe-74.dat nsis_installer_2 -
Kills process with taskkill 1 IoCs
pid Process 64 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 0300000001000000140000006c0ce2dd0584c47cac18839f14055f19fa270cdd2000000001000000500500003082054c30820434a0030201020206016de34cff62300d06092a864886f70d01010b05003081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a301e170d3030303130313030303030305a170d3438313231353039313533375a3081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a30820122300d06092a864886f70d01010105000382010f003082010a0282010100ae86c5043ed34d99f44fa3052ea34047a7fbbe33188b1dc2ca645ca3249e85e54b4921d4998fda6a22247c32d9087d742af3bf850803ae8c1e25faad53fb8fd823b7353d9a3ac992bf917f693826c790e53a540b120b6553508ec9585e467d310bd3ef9fb61731deb522eb78f43f824b34be36782db7a8cb162cd22247b14e4c5ae633ed66542354a59971bddc59160ecdc521b4477c93ca9e624e0af00298602300f5dc368819c3cb9f02604636888276b3a498570473b5328b0834f327c34285e333da9207e12f0edbb654c8cf11e3cc7cba17a52cd7cd42c10ae095a2e4eb9d3e3f361488243f0584af40e72d6e6e182149bfb8342384f60f12e14734258d0203010001a382017430820170300f0603551d130101ff040530030101ff3082012c06096086480186f842010d0482011d138201195468697320526f6f74206365727469666963617465207761732067656e65726174656420627920436861726c65732050726f787920666f722053534c2050726f7879696e672e20496620746869732063657274696669636174652069732070617274206f66206120636572746966696361746520636861696e2c2074686973206d65616e73207468617420796f752772652062726f7773696e67207468726f75676820436861726c65732050726f787920776974682053534c2050726f7879696e6720656e61626c656420666f72207468697320776562736974652e20506c656173652073656520687474703a2f2f636861726c657370726f78792e636f6d2f73736c20666f72206d6f726520696e666f726d6174696f6e2e300e0603551d0f0101ff040403020204301d0603551d0e04160414f8d0dc54367cf794020f8b92783a5d8a91251f9f300d06092a864886f70d01010b05000382010100662271eb9d5c744c88382de98ba37320e6312104d04273a92007a8670976d6530e6347d00bbded1319bb6754f36237596095922911e3661a70354f6ba0b797a76258be7adebb8c8dbeeed977760b80271d74b2444d92f6c1337a379b73545b251de5f8812b9625abbbfaedc15f8c6c374b9b26dd0fef035185f5899d8819e689dc6db5f0babbfd637c52b1bec80115b889faeed493d4112d744954ad3abe6607c41a4a2d657ba330ed131fa4e8c25bb28ee181dcef8da91c17bfd30a23c8eae81b152ed85ff938afc32b34ffdaffbdb72d9bb04067bfc87f579eba9637b165ea008ea7408bc8265f33c039bf60f506d245a6b53017afc8e161d70ed5b0d76576 aliens.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD aliens.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3764 PING.EXE 3216 PING.EXE 3720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3576 key.exe 3576 key.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeImpersonatePrivilege 3576 key.exe Token: SeTcbPrivilege 3576 key.exe Token: SeChangeNotifyPrivilege 3576 key.exe Token: SeCreateTokenPrivilege 3576 key.exe Token: SeBackupPrivilege 3576 key.exe Token: SeRestorePrivilege 3576 key.exe Token: SeIncreaseQuotaPrivilege 3576 key.exe Token: SeAssignPrimaryTokenPrivilege 3576 key.exe Token: SeImpersonatePrivilege 3576 key.exe Token: SeTcbPrivilege 3576 key.exe Token: SeChangeNotifyPrivilege 3576 key.exe Token: SeCreateTokenPrivilege 3576 key.exe Token: SeBackupPrivilege 3576 key.exe Token: SeRestorePrivilege 3576 key.exe Token: SeIncreaseQuotaPrivilege 3576 key.exe Token: SeAssignPrimaryTokenPrivilege 3576 key.exe Token: SeImpersonatePrivilege 3576 key.exe Token: SeTcbPrivilege 3576 key.exe Token: SeChangeNotifyPrivilege 3576 key.exe Token: SeCreateTokenPrivilege 3576 key.exe Token: SeBackupPrivilege 3576 key.exe Token: SeRestorePrivilege 3576 key.exe Token: SeIncreaseQuotaPrivilege 3576 key.exe Token: SeAssignPrimaryTokenPrivilege 3576 key.exe Token: SeImpersonatePrivilege 3576 key.exe Token: SeTcbPrivilege 3576 key.exe Token: SeChangeNotifyPrivilege 3576 key.exe Token: SeCreateTokenPrivilege 3576 key.exe Token: SeBackupPrivilege 3576 key.exe Token: SeRestorePrivilege 3576 key.exe Token: SeIncreaseQuotaPrivilege 3576 key.exe Token: SeAssignPrimaryTokenPrivilege 3576 key.exe Token: SeImpersonatePrivilege 3576 key.exe Token: SeTcbPrivilege 3576 key.exe Token: SeChangeNotifyPrivilege 3576 key.exe Token: SeCreateTokenPrivilege 3576 key.exe Token: SeBackupPrivilege 3576 key.exe Token: SeRestorePrivilege 3576 key.exe Token: SeIncreaseQuotaPrivilege 3576 key.exe Token: SeAssignPrimaryTokenPrivilege 3576 key.exe Token: SeManageVolumePrivilege 3520 jg2_2qua.exe Token: SeShutdownPrivilege 3796 msiexec.exe Token: SeIncreaseQuotaPrivilege 3796 msiexec.exe Token: SeSecurityPrivilege 752 msiexec.exe Token: SeCreateTokenPrivilege 3796 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3796 msiexec.exe Token: SeLockMemoryPrivilege 3796 msiexec.exe Token: SeIncreaseQuotaPrivilege 3796 msiexec.exe Token: SeMachineAccountPrivilege 3796 msiexec.exe Token: SeTcbPrivilege 3796 msiexec.exe Token: SeSecurityPrivilege 3796 msiexec.exe Token: SeTakeOwnershipPrivilege 3796 msiexec.exe Token: SeLoadDriverPrivilege 3796 msiexec.exe Token: SeSystemProfilePrivilege 3796 msiexec.exe Token: SeSystemtimePrivilege 3796 msiexec.exe Token: SeProfSingleProcessPrivilege 3796 msiexec.exe Token: SeIncBasePriorityPrivilege 3796 msiexec.exe Token: SeCreatePagefilePrivilege 3796 msiexec.exe Token: SeCreatePermanentPrivilege 3796 msiexec.exe Token: SeBackupPrivilege 3796 msiexec.exe Token: SeRestorePrivilege 3796 msiexec.exe Token: SeShutdownPrivilege 3796 msiexec.exe Token: SeDebugPrivilege 3796 msiexec.exe Token: SeAuditPrivilege 3796 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3796 msiexec.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2724 002.exe 2724 002.exe 908 Setup.exe 3108 setup.exe 3656 aliens.exe 500 08B935EBAFB9032A.exe 3588 08B935EBAFB9032A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 744 3584 Microsoft_Windows_10_keygen_by_KeygenNinja.exe 77 PID 3584 wrote to memory of 744 3584 Microsoft_Windows_10_keygen_by_KeygenNinja.exe 77 PID 3584 wrote to memory of 744 3584 Microsoft_Windows_10_keygen_by_KeygenNinja.exe 77 PID 744 wrote to memory of 3688 744 cmd.exe 80 PID 744 wrote to memory of 3688 744 cmd.exe 80 PID 744 wrote to memory of 3688 744 cmd.exe 80 PID 744 wrote to memory of 3008 744 cmd.exe 81 PID 744 wrote to memory of 3008 744 cmd.exe 81 PID 744 wrote to memory of 3008 744 cmd.exe 81 PID 744 wrote to memory of 1420 744 cmd.exe 82 PID 744 wrote to memory of 1420 744 cmd.exe 82 PID 744 wrote to memory of 1420 744 cmd.exe 82 PID 744 wrote to memory of 2952 744 cmd.exe 83 PID 744 wrote to memory of 2952 744 cmd.exe 83 PID 744 wrote to memory of 2952 744 cmd.exe 83 PID 2952 wrote to memory of 4036 2952 keygen-step-3.exe 84 PID 2952 wrote to memory of 4036 2952 keygen-step-3.exe 84 PID 2952 wrote to memory of 4036 2952 keygen-step-3.exe 84 PID 744 wrote to memory of 3612 744 cmd.exe 86 PID 744 wrote to memory of 3612 744 cmd.exe 86 PID 744 wrote to memory of 3612 744 cmd.exe 86 PID 4036 wrote to memory of 3764 4036 cmd.exe 87 PID 4036 wrote to memory of 3764 4036 cmd.exe 87 PID 4036 wrote to memory of 3764 4036 cmd.exe 87 PID 3008 wrote to memory of 3576 3008 keygen-pr.exe 88 PID 3008 wrote to memory of 3576 3008 keygen-pr.exe 88 PID 3008 wrote to memory of 3576 3008 keygen-pr.exe 88 PID 3612 wrote to memory of 2724 3612 keygen-step-4.exe 89 PID 3612 wrote to memory of 2724 3612 keygen-step-4.exe 89 PID 3612 wrote to memory of 2724 3612 keygen-step-4.exe 89 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3576 wrote to memory of 2800 3576 key.exe 91 PID 3612 wrote to memory of 908 3612 keygen-step-4.exe 95 PID 3612 wrote to memory of 908 3612 keygen-step-4.exe 95 PID 3612 wrote to memory of 908 3612 keygen-step-4.exe 95 PID 908 wrote to memory of 3108 908 Setup.exe 96 PID 908 wrote to memory of 3108 908 Setup.exe 96 PID 908 wrote to memory of 3108 908 Setup.exe 96 PID 3108 wrote to memory of 3656 3108 setup.exe 97 PID 3108 wrote to memory of 3656 3108 setup.exe 97 PID 3108 wrote to memory of 3656 3108 setup.exe 97 PID 3612 wrote to memory of 3520 3612 keygen-step-4.exe 98 PID 3612 wrote to memory of 3520 3612 keygen-step-4.exe 98 PID 3612 wrote to memory of 3520 3612 keygen-step-4.exe 98 PID 3656 wrote to memory of 3796 3656 aliens.exe 99 PID 3656 wrote to memory of 3796 3656 aliens.exe 99 PID 3656 wrote to memory of 3796 3656 aliens.exe 99 PID 3656 wrote to memory of 500 3656 aliens.exe 100 PID 3656 wrote to memory of 500 3656 aliens.exe 100 PID 3656 wrote to memory of 500 3656 aliens.exe 100 PID 3656 wrote to memory of 3588 3656 aliens.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_10_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_10_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\intro.exeintro.exe 1O5ZF3⤵
- Executes dropped EXE
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:3764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\002.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\002.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\sibD22.tmp\0\setup.exe"C:\Users\Admin\AppData\Local\Temp\sibD22.tmp\0\setup.exe" -s5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Program Files (x86)\k42a4i0zb2uk\aliens.exe"C:\Program Files (x86)\k42a4i0zb2uk\aliens.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"7⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\08B935EBAFB9032A.exeC:\Users\Admin\AppData\Local\Temp\08B935EBAFB9032A.exe 0011 installp17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:500 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"8⤵PID:1596
-
-
C:\Users\Admin\AppData\Roaming\1616099004881.exe"C:\Users\Admin\AppData\Roaming\1616099004881.exe" /sjson "C:\Users\Admin\AppData\Roaming\1616099004881.txt"8⤵PID:3132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"8⤵PID:3712
-
-
C:\Users\Admin\AppData\Roaming\1616099006538.exe"C:\Users\Admin\AppData\Roaming\1616099006538.exe" /sjson "C:\Users\Admin\AppData\Roaming\1616099006538.txt"8⤵PID:2200
-
-
-
C:\Users\Admin\AppData\Local\Temp\08B935EBAFB9032A.exeC:\Users\Admin\AppData\Local\Temp\08B935EBAFB9032A.exe 200 installp17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe8⤵PID:1920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe9⤵
- Kills process with taskkill
PID:64
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\08B935EBAFB9032A.exe"8⤵PID:1596
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 39⤵
- Runs ping.exe
PID:3720
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Program Files (x86)\k42a4i0zb2uk\aliens.exe"7⤵PID:3844
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 38⤵
- Runs ping.exe
PID:3216
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\jg2_2qua.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\jg2_2qua.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file1.exe"4⤵PID:740
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:752 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CEF0D0A71DC4685ED70D5D4C23A34F1D C2⤵
- Loads dropped DLL
PID:3692
-